Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency gradio to v4.19.2 [SECURITY] #29

Merged
merged 1 commit into from
Apr 17, 2024

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Feb 23, 2024

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
gradio ==4.19.0 -> ==4.19.2 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2024-1729

Impact

This security policy is with regards to a timing attack that allows users of Gradio apps to potentially guess the password of password-protected Gradio apps. This relies on the fact that string comparisons in Python terminate early, as soon as there is a string mismatch. Because Gradio apps are, by default, not rate-limited, a user could brute-force millions of guesses to figure out the correct username and password.

Patches

Yes, the problem has been patched in Gradio version 4.19.2 or higher. We have no knowledge of this exploit being used against users of Gradio applications, but we encourage all users to upgrade to Gradio 4.19.2 or higher.

Fixed in: gradio-app/gradio@e329f1f

CVE-2024-1727

A Cross-Site Request Forgery gives attackers the ability to upload many large files to a victim, if they are running Gradio locally. To resolve this a PR tightening the CORS rules around Gradio applications has been submitted. In particular, it checks to see if the host header is localhost (or one of its aliases) and if so, it requires the origin header (if present) to be localhost (or one of its aliases) as well.

CVE-2024-1728

gradio-app/gradio is vulnerable to a local file inclusion vulnerability due to improper validation of user-supplied input in the UploadButton component. Attackers can exploit this vulnerability to read arbitrary files on the filesystem, such as private SSH keys, by manipulating the file path in the request to the /queue/join endpoint. This issue could potentially lead to remote code execution. The vulnerability is present in the handling of file upload paths, allowing attackers to redirect file uploads to unintended locations on the server.


Release Notes

gradio-app/gradio (gradio)

v4.19.2

Compare Source

Features
Fixes

v4.19.1

Compare Source

Features
Fixes

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot changed the title Update dependency gradio to v4.19.2 [SECURITY] Update dependency gradio to v4.19.2 [SECURITY] - autoclosed Feb 23, 2024
@renovate renovate bot closed this Feb 23, 2024
@renovate renovate bot deleted the renovate/pypi-gradio-vulnerability branch February 23, 2024 07:35
@renovate renovate bot changed the title Update dependency gradio to v4.19.2 [SECURITY] - autoclosed Update dependency gradio to v4.19.2 [SECURITY] Feb 28, 2024
@renovate renovate bot reopened this Feb 28, 2024
@renovate renovate bot restored the renovate/pypi-gradio-vulnerability branch February 28, 2024 18:24
@renovate renovate bot force-pushed the renovate/pypi-gradio-vulnerability branch from d3dbac5 to 579fc89 Compare February 28, 2024 18:24
@Paillat-dev
Copy link
Owner

Cannot update because of gradio-app/gradio#7549

@renovate renovate bot force-pushed the renovate/pypi-gradio-vulnerability branch from 579fc89 to 9cf9da4 Compare March 6, 2024 06:55
@renovate renovate bot force-pushed the renovate/pypi-gradio-vulnerability branch from 9cf9da4 to 724ac94 Compare March 6, 2024 07:31
@Paillat-dev Paillat-dev merged commit 32ace31 into main Apr 17, 2024
2 of 3 checks passed
@renovate renovate bot deleted the renovate/pypi-gradio-vulnerability branch April 17, 2024 12:27
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant